Security best practices

Scope and purpose of this content

This guide is for Airlock IAM integrators and aims to help to achieve a good level of security when deploying and configuring Airlock IAM.

The guide does not claim to be self-explanatory. The operator and configurator still has to understand the security requirements of the project and must understand the security implications of deploying and configuring Airlock IAM.